{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T06:56:12Z","timestamp":1769928972507,"version":"3.49.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679390","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"466-473","source":"Crossref","is-referenced-by-count":1,"title":["DefenceRank - Ranking Based Attack Graph Analysis and Defence Prioritization"],"prefix":"10.1109","author":[{"given":"Rajendra Shivaji","family":"Patil","sequence":"first","affiliation":[{"name":"School of Electrical and Computer Science KTH Royal Institute of Technology,Stockholm,Sweden"}]},{"given":"Markus Dypbukt","family":"K\u00e4llman","sequence":"additional","affiliation":[{"name":"School of Electrical and Computer Science KTH Royal Institute of Technology,Stockholm,Sweden"}]},{"given":"Viktoria","family":"Fodor","sequence":"additional","affiliation":[{"name":"School of Electrical and Computer Science KTH Royal Institute of Technology,Stockholm,Sweden"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2016.02.001"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2008.88"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2002.1021806"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00843-6_30"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076738"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAT.2013.6522000"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3200601"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2019.00021"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46666-7_6"},{"key":"ref11","article-title":"The pagerank citation ranking: Bring order to the web","author":"Page","year":"1998","journal-title":"tech. rep., Technical report, stanford University"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/11856214_7"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_2"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64701-2_25"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.5121\/ijcnc.2015.7101"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(98)00110-X"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1137\/140976649"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.116467"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00199-4_13"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3232799"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-62230-5_4"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-47748-5_8"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"London, United Kingdom","start":{"date-parts":[[2024,9,2]]},"end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679390.pdf?arnumber=10679390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T05:21:47Z","timestamp":1727241707000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679390\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679390","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}